Zobrazeno 1 - 10
of 15 761
pro vyhledávání: '"cryptosystem"'
Publikováno v:
International Journal of Pervasive Computing and Communications, 2022, Vol. 20, Issue 5, pp. 607-619.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJPCC-06-2022-0240
Publikováno v:
AIMS Mathematics, Vol 9, Iss 11, Pp 32232-32256 (2024)
Given the application domains of soft set theory, such as decision-making processes, image processing, machine learning, and data mining, it is natural to consider that this theory could be utilized more effectively in encryption systems. A review of
Externí odkaz:
https://doaj.org/article/a8dc6a0a2df94481b7798b7c585fd329
Publikováno v:
Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, Vol 22, Iss 5, Pp 80-88 (2024)
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and
Externí odkaz:
https://doaj.org/article/05d4a87608fe48eb977c5ecbbcd356a4
Autor:
Newroz Nooralddin Abdulrazaq
Publikováno v:
Zanco Journal of Pure and Applied Sciences, Vol 36, Iss 5 (2024)
In today's digital world, the extensive use of devices, including smartphones, tablets, IoT devices, and the internet, emphasizes the necessity for strong security measures. These measures are essential to safeguard both user data and sensitive gover
Externí odkaz:
https://doaj.org/article/4a969983533544f5b3da18891a221ae6
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-8 (2024)
Abstract The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems. This paper introduces a novel cryptosystem, Public Key Cry
Externí odkaz:
https://doaj.org/article/7e6700d0bb74490b9116fcf56433d7e8
Autor:
Viktor Avramenko, Mykyta Bondarenko
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 2, Pp 147-159 (2024)
The subject matter of this article is the process of securing visual data through encryption. The goal of this study is to develop a new approach for image encryption and decryption using an image as a key, where security and performance are comparab
Externí odkaz:
https://doaj.org/article/299e010db0974646afae4177eaf41169
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 17, Iss 1, Pp 1-45 (2024)
Abstract Binary optimization problems belong to the NP-hard class because their solutions are hard to find in a known time. The traditional techniques could not be applied to tackle those problems because the computational cost required by them incre
Externí odkaz:
https://doaj.org/article/eeb0087405a742efa91d7fea16161a41
Autor:
Mohamed Abdel-Basset, Reda Mohamed, Safaa Saber, Ibrahim M. Hezam, Karam M. Sallam, Ibrahim A. Hameed
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 6, Pp 102093- (2024)
This paper examines the performance of three binary metaheuristic algorithms when applied to two distinct knapsack problems (0–1 knapsack problems (KP01) and multidimensional knapsack problems (MKP)). These binary algorithms are based on the classi
Externí odkaz:
https://doaj.org/article/0aee5287a5ff4e39a45d4c302a2ea400
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 5, Pp 102044- (2024)
The rapid growth of the Internet of Things (IoT) has led to an increased deployment of unmanned aerial vehicles (UAVs) across various sectors. However, efficiency and security issues are persistently among the primary challenges in UAV networks. In a
Externí odkaz:
https://doaj.org/article/54b5b012bf3141628d96a83260868d6d
Publikováno v:
Tongxin xuebao, Vol 45, Pp 141-151 (2024)
To analyze the implementation security of the PRIDE lightweight cryptosystem proposed at CRYPTO in 2014, a novel method of impossible statistical fault analysis on the ciphertext-only attack assumption was proposed.Furthermore, new distinguishers wer
Externí odkaz:
https://doaj.org/article/824d7a8586d94c508bab2b0e09157aee